Author of the publication

Security of Online Reputation Systems: The evolution of attacks and defenses.

, and . IEEE Signal Process. Mag., 29 (2): 87-97 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ivermectin inhibits tumor metastasis by regulating the Wnt/β-catenin/integrin β1/FAK signaling pathway, , , , , , and . American journal of cancer research, 12 (10): 4502--4519 (October 2022)Synthetic Forgery Attack against Continuous Keystroke Authentication Systems., and . ICCCN, page 1-7. IEEE, (2018)Low-power carry select adder using fast all-one finding logic., , and . SoSE, page 1-5. IEEE, (2008)Double Verifiably Encrypted Signature-Based Contract Signing Protocol., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 86-93. Springer, (2010)Bidirectional Range Extension for TCAM-Based Packet Classification., and . Networking, volume 6091 of Lecture Notes in Computer Science, page 351-361. Springer, (2010)Diagnose the mild cognitive impairment by constructing Bayesian network with missing data., , , , and . Expert Syst. Appl., 38 (1): 442-449 (2011)Monitoring the status of iBeacons with crowd sensing., , , , and . ICC, page 1-7. IEEE, (2017)Trust-aware privacy evaluation in online social networks., , , and . ICC, page 932-938. IEEE, (2014)A cross layer routing protocol in CRMANET., , , , and . HPSR, page 219-220. IEEE, (2013)Resource allocation for secure full-duplex OFDMA radio systems : (Invited paper)., , and . SPAWC, page 1-5. IEEE, (2017)